Saturday, 8 July 2017

How to Bypass windows password easily

Requirement to perform this activity

1.       Pen drive / CD/Floppy

How to use this tool.

If you are using windows7:
1) Plug your USB thumb drive in
2) Right click usb_install2_RUNASADMIN.bat, pick Run As Administrator
3) Follow the installation procedure.

Otherwise:
1) Plug your USB thumb drive in
2) Double click (run) on the USB_INSTALL_DIFF.vbs
3) Follow the installation procedure


Wednesday, 12 August 2015

How to create usb flash drive bootable without any software

Now days CD and DVD are Old Fashion, if you need the portable Installation as well as data drive with you, we have to make an usb stick bootable, which is normal in use these days with having massive capacity to store data.

Today I am goona show you how to create a bootable windows 7 installation USB drive without any software.

Here we go:-

First copy window CD or DVD on your pc in a folder (any where c drive, d drive)

Then open cmd

Press windows button + R 

















Tuesday, 27 January 2015

How to use WhatsApp online on Computer without installing any app…

Recently we install Blue stack software to use WhatsApp on our Pc or laptops but now things are changing, now you can easily access all of your contact and chat with history on your pc with a simple feature provided by WhatsApp. Feature name is “WhatsApp on web”

What you have to do, In windows phone when you open WhatsApp on the right side bottom it show you three dots ( … ) for option, when you press those button there you have four option including setting option. And another option is “WHATSAPP ON WEB”

Click on that, it will open a window and turn on your camera to scan code...
Now what you have to do is... Open Google chrome in your computer and open a site that is




You have to scan that RQ code from your phone and then you will be able to see all your phone WhatsApp chat and contacts.

To end the connection just click on Logout….



Enjoy…….

Tuesday, 30 December 2014

Protect Chrome & Firefox with Password




Now days we all use internet most time from home and office Desktop and laptop, every time we have to login to our accounts after we just tired of filling email id and passwords, for this we save password into our browser (remember password for this site option), to protect these password form others we do nothing but now we can set the authentication or passwords to open the browser for this you have to follow some step how to protect the browser with passwords

Here these step are....

Wednesday, 8 October 2014

Everyone should know what to backup before formatting a PC


















 Hello everyone now days desktop and laptops are essential in our daily life. And data in it is most most important for us some time when the pc doesn’t response good as always, that time we thought that we show format our PC, so before formatting a pc we should know what to backup so that we doesn’t lose anything.

Today I will suggest you what should be important for you to backup before you do something wrong… 
 

Tuesday, 16 September 2014

Registry editor is disabled by our Administrator !!! Virus



Some time when we need to make some changes in the registry of our Operating System to do 
some tweak but it appear with a message that the registry editor is disabled by your administrator.










I will show a easy way how to enable the registry editor.

Thursday, 4 September 2014

Types of Hacking Attack (P-S-S)










Generally discusses three types of attacks against computer systems

1.Physical
A physical attack uses conventional weapons, such as bombs or fire. A syntactic attack uses virus-type software to disrupt or damage a computer system or network. A semantic attack is a more subtle approach. Its goal is to attack users' Confidence by causing a computer system to produce errors and unpredictable results.

2.Syntactic
Syntactic attacks are sometimes grouped under the term "malicious software" or "malware". These attacks may include viruses, worms, and Trojan horses. One common vehicle of delivery formal ware is email.

3.Semantic
Semantic attacks involve the modification of information or dissemination of incorrect information. Modification of information has been perpetrated even without the aid of computers, but computers and networks have provided new opportunities to achieve this. Also, the dissemination of incorrect information to large numbers of people quickly is facilitated by such mechanisms as email, message boards, and
websites


Hacking tricks can be divided into different categories elaborated below:
 
2.  Phishing
4.  Spoofing
5.  Spyware

How to Bypass windows password easily

Requirement to perform this activity 1.        Pen drive / CD/Floppy 2.        Kon boot software  ( https://drive.google.com/file/d/...